O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

1.2. Parallel operators

The syntax seen in the previous section is enough to describe the communications of any sequential process, and in particular the actions of any single participant in a protocol. These components are relatively easy to understand as we can see the sequences of actions and states that they go through: at any time a component is simply in one of the states we have defined.

Things become far more interesting when we put a number of these in parallel, as it is usually far harder to understand what happens when they interact with each other. A state of the entire system is composed of one state of each component, so the number of possible states increases exponentially with the size of the network – this quickly gets beyond ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required